Inside the Briefcase

FICO Scales with Oracle Cloud

FICO Scales with Oracle Cloud

Doug Clare, Vice President at FICO, describes how Oracle...

Is Your Enterprise IT the Best It Can Be?

Is Your Enterprise IT the Best It Can Be?

Enterprise IT is a driver of the global economy....

The IoT Imperative for Consumer Industries

The IoT Imperative for Consumer Industries

This IDC white paper examines current and future...

How to align your visual brand guidelines and create consistently on-brand content

How to align your visual brand guidelines and create consistently on-brand content

In this ebook, we’ll explore the various themes leading...

Your B2B Content Strategy in 2017: How To Think Like A Movie Studio + 6 Other Tactics

Your B2B Content Strategy in 2017: How To Think Like A Movie Studio + 6 Other Tactics

Jon Lombardo, Creative Lead, LinkedIn, reveals in this presentation...

Why don’t we use BI to analyse security and storage data?

June 30, 2010 No Comments

Maybe it sounds too “meta,” but we should be able to use technology to solve technology problems.

This is my rationale: we know that users tend to ignore a lot of IT security policies because there is a scarcity of data available about the vulnerabilities, the history of attacks of data loss in a given firm and what has worked in the past. Job one, in other words, is for IT departments to not simply spend more money on intrusion-detection mechanisms (although they need to do that), but start doing a self-evaluation of their IT security posture. Only once they can confidently assess the number of incidents they have endured, the business impacts it has had and the most challenging areas of vulnerability will they be able to move to a more proactive approach.

Read More

DATA and ANALYTICS 

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner IT Operations

SuperCharge Your Cloud

American CISO

IBC 2018

ITBriefcase Comparison Report